Medium Access Control Protocol for Radio LANs
|
|
- Tyler Hardy
- 8 years ago
- Views:
Transcription
1 DOC.: IEEE P802.11/ Medium Access Control Protocol for Radio LANs K. S. Natarajan Chia Chi Huang David F. Bantz IBM Thomas J. Watson Research Center P.O. Box 704, Yorktown Heights. NY Abstract The medium access control protocol concerns the use of broadcast messages from a central controller to demarcate three intervals: the first two intervals in which transmission is scheduled by the controller, and the third in whicll a decentralized contention-based medium access control protocol is used. Tile medium access control protocol is well-adapted, but not limited, to use with frequency-hopping methods of spread-spectrum radio transmissions. 1. Introduction In indoor digital data radio systems, a key problpm is providing efficient access to the channel, as that channel is limited in capacity and shared by all its users. In this contribution we assume a network architecture where a finite number of Access Points are attached to a Distribution System. The Distrihution System enables: Communication between mobile statiol1s and applications/data residing in the enterprise computing environment. A typical structllre has mobile stations communicating to an Access Point (a fixed station) acting as a bridge between the radio environment and tile Distribution System. The Access Point relays messages to otller resources attaclled to tile Distriblltion System. Communication between mobile stations. If COllllTlllnication is between two mobile stations, tllis can occur utilizing the store-and-forward capability of one or more Access Points attaclled to a Distribution SystPIll. An approach to setting up ad-hoc networks between mobile stations would require implementation of Access Point functions in software in mobile station adapter cards and a metllod for designating one of tllem to perform Access Point functions. Eacll Access Point has processing and storage capability to perform store-andforward functions. The Distribution System can, in general, be an IEEE 802 network. Eacll mobile station can communicate with a set of Acr,oss Points. Witllin eacll Basic Service Area tile radio link is Ilalf-duplex that is sharad between inbound (mobile stations to Access Point) and outbound (Access Point to mobile stations) traffic.
2 DOC.: IEEE P802.11/91-74 In this contribution, the transmission technique assumed is spread spectrum, authorized by the US Federal Communications Commission in its regulations, part , for use in certain frequency bands without user license. Specifically, the form of spread-spectrum considered is frequency-hopping, bllt the medium access control protocol can also be used with discrete-sequence systems. In a frequency-hopping system, the carrier frequency of the transmitter changes at intervals of time, remaining constant between those instants. The period of constant frequency is called an hop and it is only during these hops that messages rnay be exchanged. Because these hops are of finite duration they impose a structure on the use of the radio channel: no transmission may cross a hop boundary. Hops impose a framing structure on time. Efficient radio channel usage is the basic requirement for a practical indoor radio data networks. The different types of traffic from various data terminals are usually bursty in nature and not predictable. Static channel allocation means such as frequency division or fixed time division are inefficient for many forms of computer-to-computer traffic, known to be bursty in nature. Furthermore, they are not well-suited for mobile communication systems with a dynamically changing population of mobile stations. Random access schemes (such as Aloha, Slotted Aloha, CSMA and its variants) are known for their short response time when channel load is light. With these schemes, the shared channel should not be heavily loaded to avoid potential stability problem. When channel load increases, random access schemes can introduce unacceptable delays and can become unstable if not suitably controlled. Controlled access schemes, based on polling or reservation methods, achieve much better channel use efficiency when load is heavy. However, polling schemes may suffer from overhead unless care is taken to millillli7p the effective walk-time (i.e, time required to poll a mobile station) on the response time seen by the mobile stations. Controlled access schemes have the following desirable characteristics. They: allow the implementation of non-isochronolls and isochronous applications. can ensure fairness of access to mobile stations. No mobile station is deprived of communication because of capture effects. A number of comprehensive survey articles [TOB82] [KlJR84] [KLE8S] as well as text books [HAY84] [BER87] [ROM90] describe multiple access protocols for use in different communication environments. 2
3 DOC.: IEEE P802.11/ Proposed Scheme In order to reduce response time when traffic load is light and increase channel use efficiency when traffic load is intense, a hybrid of controlled access and random access scheme is desirable. The proposed medium access control scheme is based on a frame structure and can be used under FCC part 15 frequency hopping rules. The frame structure of the proposed scheme is as follows. The duration of a hop is subdivided into three intervals, such that a different medium access control protocol is used in each interval. Centralized control is used in the first two intervals and decentralized control in the third interval. Frame structure The medium access control protocol is now briefly described with respect to Fig. 1 below. In Fig. 1, the labelled intervals are: G - the interval during which the transmitter carrier frequency is changing, of duration H. Period A - Period B - AH (Broadcast from Access Point to mobile stations) - the interval during which the Access Point broadcasts a special message to all the mobile stations that identifies the beginning of Period A and contains additional control information (see below). A (Broadcast from Access Point to mobile stations) - the interval during which outbound traffic is transmitted. The Access Point broadcasts packets and mobile stations receive packets addressed to them. BH (Broadcast from Access Point to mobile stations) - the interval during which the Access Point broadcasts a special message to all the mobile stations signifying the end of the Period A and the beginning of Period B. It also contains additional control information (see below). B (Contention Free Transfer from Mobile stations to Access Point) - at the end of Period A, mobile stations take turn to transmit according to the slot allocation specified in BH. 3
4 DOC.: IEEE P802.11/91-74 Period C - CH (Broadcast from Access Point to mobile stations) - the interval during which the Access Point broadcasts a special message to all the mobile stations, identifying the end of the Period B and the beginning of the Period C. The message also conveys the TC, length of the Period C. C (Random Access from Mobile stations to Access Point) - the interval during which any station may contend for the channel and transmit a message without the consent of the Access Point. A Slotted-ALOHA protocol can be used in this interval. This interval is used for the following types of information: Registration requests that enable mobile stations to identify themselves and request the services of the Access Point. This is necessary because the set of mobile stations accessing the wireless LAN can change dynamically with time. An Access Point can not assume a priori knowledge about the number or the identity of mobile stations desiring its services. Request bandwidth for transmission in Contention Free mode (Period B). Both isochronous or non-isochronous services can be supported by transmitting the appropriate bandwidth reservation request to the Access Point. Allocations based on reservation requests are specified in the AH and BH headers of the next frame. Transmission of bursty data (single packet messages). Period A operation - Each mobile station waits for Header AH corresponding to Period A. The header specifies the lengths of all three intprvals (TA, TB and TC) and the lengths of their corresponding headers (TAH, TBH and TCH). On correct reception of Header AH, each mobile station sets a timer for TA so that it knows when to receive Header BH and learn about the beginning of Period B. Header AH identifies the start of the information frame, carries an unique identification of the Access Point, specifies the frequency hopping pattern and carries other system control information. In Period A the Access Point controls the transmissions outbound to the mobile stations. The corresponding header (AH) control information for this interval is broadcasted by the Access Point and received by all mobile stations. On correct reception of the above control information Header AH, each receiving mobile station can receive packets broadcasted by the Access Point that are addressed to it. The remaining packets are discarded by the mobile station. 4
5 DOC.: IEEE P802.11/91-7Lt Period B operation - At the end of Period A, each mobile station waits for Header BH corresponding to Period B. It contains the lengths of Periods Band C (TB, TC) and the lengths of their corresponding headers (TBH, TCH). When received, each mobile station sets a timer for TB so that it knows when to receive Header CH and learn about the beginning of Period C, the contention interval. Header BH also specifies such control information as which mobile stations may transmit, the number of packets allocated to each of them and the sequence in which they can transmit in the current frame. The mobile stations transmit packets to the Access Point according to the allocation information received in BH. If a mobile station fails to receive BH correctly, then it will not make use of any slots that may have been allocated to it in the current frame. I G IAH I A IBHI B ICHI C I G I I... I.. 111I " " " I I " I I " " " " II... I Broadcast Contention Freel Contention Access POintl Mobiles to Mob i les to to Mob i 1 es I Access Point Access Point ->1 H I<--TA >I I<------TB------>I I<---TC >I H 1<- AH - Header for Period A BH - Header for Per i ad B CH - Header for Period C Figure 1. Frame Structure of Medium Access Control Scheme Period C operation - At the end of Period B, each mobile station waits for Header CH corresponding to Period C. The header contains TC, the length of the third interval. When received, each mobile station sets a timer for TC so that it knows when to schedule its next frequency change. 5
6 DOC.: IEEE P802.11/91-7i Hopping considerations - Broadcast reception of messages is not guaranteed, only likely. Radio conditions may be such that a particular mobile station does not hear the broadcast message AH. If a mobile station does not hear Header AH, then it refrains from participation in the current frame by remaining quiet for the entire hop. Instead, it remembers the hop length of the last frame to set a timer so that it knows when to hop, and it will listen in the next frame for the AH message. If no AH message is heard for a number of consecutive frames the mobile station must assume that it has lost hop synchronization with the rest of the system, and enter a synchronization acquisition mode (to be discussed below). Each frame period of length T = (TAH+TA+TBH+TB+TCH+TC) can also be a frequency hopping period for implementation under FCC part 15. A fixed length of T is recommended but is not necessary. Fixed length of T has following useful characteristics: When several frequency hopping patterns are used in overlapped operation in an Extended Service Area (multiple Access Points pills a Distribution System) and each Access Point uses a fixed length T per hop, then interference separation may be achieved by appropriate choice of hopping sequences for the Access Points. If all radios in a system are hopping with the same pattern, a fixed length of T permits different Basic Service Areas to hop in synchronism but at different phases of the hopping pattern. This eliminates interference between Basic Service Areas. A tradeoff needs to be made in selecting the length of T. A large T makes the system overhead smaller and a small T makes the system response time smaller. By varying TA+TB, the Access Point can expand or contract the contention interval. If the system is very lightly loaded and most of the traffic is inbound to the Access Point, it is advantageous to mobile response time to lengthen TC. Conversely, if the system is heavily loaded and most of the traffic is outboll nd, TC shou Id be minimized. TC should not be reduced to zero, however, as it is the only mechanism by which a newly activated mobile station can register itself to the Access Point. Synchronization acquisition The issue of how a newly activated mobile station acqllires synchronization with the Access Point with respect to hopping must be resolved. A method for sync acquisition is the following. A mobile station that needs to get in sync could monitor a single frequency for an AH message. Once received, the mobile station can now predict the time of the next frequency change (from the content of the AH message) and can thus hop in synchronization. It is essential that the mobile station check the AH message 6
7 DOC.: IEEE P802.11/91-7'1 for the identification of its permanent owner: otherwise the mobile station may synchronize to the wrong Access Point. Alternatively, the mobile station may hear multiple AH messages and choose a Access Point by measuring signal strength and choosing the strongest. The mobile station can then register itself to the Access Point by transmitting a message to the Access Point in the contention interval. Note that the entire hop time is (TAH + TA + TBH + TB + TCH + TC). Handoff between Access Points in a Frequency Hopping System A basic problem in providing transparent communication service for mobile stations in an Extended Service Area is handoff. A mobile station needs to know when, how, and to which Access Point to handoff. In order to achieve this goal, information has to be gathered at the mobile station about the current status of all the potential new Access Points around it such that it can make an appropriate handoff decision. In order to collect handoff information from surrounding Access Points, a mobile station must have knowledge of: 1. Who are the handoff candidates (i.e., which surrounding Access Points can serve the mobile station)? How many of the candidates should be monitored? 2. For each handoff candidate Access Point, when can its handoff information be collected? which state of its frequency hopping pattern it will be in? Furthermore, the Access Points involved in a handoff 8nd the mobile station must cooperate according to a well defined protocol for accornrlishing the handofffunction. We have considered different methods with varying degree of requirement on network synchronization among the Access Points. I n Ollf~ method, Access Points are tightly synchronized with each other. In another method, each Access Point can operate independently of other Access Points without any need for tight global synchronization. Details on key issues related to handoff will be described in a future contribution. Implementation A partial implementation of the protocol has been done in software. A software implementation is consistent with the performance requirements of slow frequency hopping, which by FCC regulations limits the duration of an hop to 400 milliseconds. Mobile stations need to have the capability of receiving broadcast messages. This can be done by adopting the convention used ill sol11e data-link-level protocols, namely, an address of all ones, or any coml11only-agreed-to address, signifies a broadcast address. 7
8 DOC.: IEEE P802.11/91]'( 3. Summary The proposed mediu m access control protocol uses broadcast messages to demarcate three intervals within an hop: two intervals during which the Access Point has control, and a third interval during which access is gained by contention. The timing of the broadcast messages controls whether the system appears predominantly contention-based or controlled by a central controller. As the load on the system increases the Access Point can switch to a controlled method of medium access, unconditionally stable. The protocol meshes well with the constraints of slow frequency hopping, although it can be used with any signalling technique (spreadspectru m or not). The protocol has the following desirable characteristics: short access time if the channel is lightly loaded good channel utilization if the channel is heavily loaded unconditionally stable simple implementation matched well to typical traffic patterns, where most traffic is outbound from an Access Point attached to a Distribution System to mobile stations. Acknowledgement - The authors thank Robert Cato of IBM Raleigh, NC for his contribution during the initial stages of this work. References [T0882J F. A. Tobagi, " Multiaccess Link Contro\", Computer Architectures and Protocols, edited by Paul E. Green, Jr., PlenLls Press, NY, 1982, pp [KUR84J J. F. Kurose, M. Schwartz and Y. Yemini, "Multiple-Access Protocols and Time-Constrained Communication", ACM Computing Surveys, Vol. 16, No. 1, March 1984, pp [KLESSJ L. Kleinrock, "Performance Evaluation of Distributed Computer Communication Systems", UC Los Angeles, Computer Science Department Technical Report CSD , Oct. 88. [HAYS4J J. F. Hayes, Modeling and Analysis of Computer Communication Networks, Plenum Press, New York,
9 DOC.: IEEE P802.11/91-7tt [BERB7] D. Bertsekas and R. Gallager, Data Networks, Prentice-Hall Inc., New Jersey, [ROM90] R. Rom and M. Sidi, Multiple Access Protocols - Performance and Analysis, Springer-Verlag, [CHE91] J. Cheah, Contribution IEEE P802.11/91-54, May [RVP91] C. Rypinski, Contribution IEEE P802.11/91-19, March [ALT91] P. Altmaier and J. Mathis, IEEE P802.11/91-35+, May
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationAlgorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
More informationControlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationPacket Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationLecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationGSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving
GSM and Similar Architectures Lesson 07 GSM Radio Interface, Data bursts and Interleaving 1 Space Division Multiple Access of the signals from the MSs A BTS with n directed antennae covers mobile stations
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationA research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
More informationCURRENT wireless personal communication systems are
Efficient Radio Resource Allocation in a GSM and GPRS Cellular Network David E Vannucci & Peter J Chitamu Centre for Telecommunications Access and Services School of Electrical and Information Engineering
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationTABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
More informationDynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationProtocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012
Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation
More informationIEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification
Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface
More information10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationHello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationWireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More information- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
More informationFibonacci Backoff Algorithm for Mobile Ad Hoc Networks
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More information802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
More informationA Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
More informationReal-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
More informationADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
More informationWireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
More informationPerformance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
More informationQoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationDynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet
International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 9 September -2015 3221 5687, (P) 3221 568X Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet 1
More informationA Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: choiys@mobile.snu.ac.kr Illsoo Sohn Email: sohnis@mobile.snu.ac.kr Kwang Bok Lee Email: klee@snu.ac.kr Abstract
More informationAn Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
More informationRESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
More informationScanning Delays in 802.11 Networks
Scanning Delays in 802.11 Networks David Murray Murdoch University D.Murray@murdoch.edu.au Michael Dixon Murdoch University M.Dixon@murdoch.edu.au Terry Koziniec Murdoch University T.Koziniec@murdoch.edu.au
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationHow To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
More informationCh 2.3.3 GSM PENN. Magda El Zarki - Tcom 510 - Spring 98
Ch 2.3.3 GSM In the early 80 s the European community decided to work together to define a cellular system that would permit full roaming in all countries and give the network providers freedom to provide
More information802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
More informationWAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
More informationAdaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
More informationMedium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
More informationEthernet, VLAN, Ethernet Carrier Grade
Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP
More informationVoice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
More informationFrom reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
More informationPerformance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
More informationCellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse
Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of
More informationRevision of Lecture Eighteen
Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses
More informationCommunication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
More informationFrequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More informationWireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
More informationIEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
More information2 Basic Concepts. Contents
2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationData Center Networks, Link Layer Wireless (802.11)
Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?
More informationCDMA Performance under Fading Channel
CDMA Performance under Fading Channel Ashwini Dyahadray 05307901 Under the guidance of: Prof Girish P Saraph Department of Electrical Engineering Overview Wireless channel fading characteristics Large
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More informationLab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
More informationCCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationThe Qualcomm CDMA Digital Cellular System
The Qualcomm CDMA Digital Cellular System Phil Karn Qualcomm, Inc 10555 Sorrento Valley Rd San Diego, CA 92121 karn@qualcomm.com Introduction Qualcomm, Inc. has developed and tested a digital spread spectrum
More informationMetrics for Detection of DDoS Attacks
Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,
More informationAdministrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling
Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel
More informationFrequency [MHz] ! " # $ %& &'( " Use top & bottom as additional guard. guard band. Giuseppe Bianchi DOWNLINK BS MS 890.4 UPLINK MS BS 890.2.
Frequency [MHz] 960 DOWNLINK BS MS 935 915 UPLINK MS BS 890 890.4 890.2 guard band Use top & bottom as additional guard! " # $ %& &'( " 1 2 3 4 5 6 7 8 F F uplink dwlink ( n) = [ 890.2 + 0.2( n 1) ] (
More informationContinuous network discovery using Opportunistic Scanning
Continuous network discovery using Opportunistic Scanning Authors: Date: 2009-11-17 Slide 1 Abstract This presentation is in response to WNG requesting more information on the capability of 802.11 to support
More informationCOMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
More informationThe Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
More information2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
More informationLecture 1. Introduction to Wireless Communications 1
896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
More informationA CLASS-BASED DYNAMIC BANDWIDTH ALLOCATION SCHEME FOR EPONS
A CLASS-BASED DYAMIC BADWIDTH ALLOCATIO SCHEME FOR EPOS Jing Xie,, Shengming Jiang, and Yuming Jiang 3 Institute For Infocomm Research, Heng Mui Keng Terrace, Singapore 963, Singapore Department Of Electrical
More informationLoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
More informationGSM: PHYSICAL & LOGICAL CHANNELS
GSM: PHYSICAL & LOGICAL CHANNELS AN OVERVIEW Prepared by Learntelecom.com 1. GSM: PHYSICAL AND LOGICAL CHANNELS GSM uses a mix of Frequency Division Multiple Access (FDMA) and Time Division Multiple Access
More informationWhat is DECT? DECT stands for Digital Enhanced Cordless Telecommunications.
DECT 6.0 vs 900 MHz vs 2.4GHz vs 5.8 GHz DECT 6.0 (1.9 GHz) 900 MHz 2.4 GHz 5.8 GHz FCC approved frequency for cordless telecommunication Baby monitors, microwave oven Wi-Fi electronics (routers), wireless
More informationPERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
More informationMultiple Access Techniques
Chapter 8 Multiple Access Techniques Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in the most efficient manner. As the spectrum is limited,
More informationBasic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
More informationHalmstad University Post-Print
Halmstad University Post-Print Wireless Sensor Networks for Surveillance Applications - A Comparative Survey of MAC Protocols Mahmood Ali, Annette Böhm and Magnus Jonsson N.B.: When citing this work, cite
More informationIntroduction VOIP in an 802.11 Network VOIP 3
Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11
More informationDynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationTCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
More informationISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September
Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless
More informationMultiplexing on Wireline Telephone Systems
Multiplexing on Wireline Telephone Systems Isha Batra, Divya Raheja Information Technology, Dronacharya College of Engineering Farrukh Nagar, Gurgaon, India ABSTRACT- This Paper Outlines a research multiplexing
More informationCS 8803 - Cellular and Mobile Network Security: GSM - In Detail
CS 8803 - Cellular and Mobile Network Security: GSM - In Detail Professor Patrick Traynor 9/27/12 Cellular Telecommunications Architecture Background Air Interfaces Network Protocols Application: Messaging
More information